Module 17 Flashcards

1
Q

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.

What is best practice for the remaining unused account?

A

Disable the account until the employee is ready to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network.

What type of documentation did Randy discover?

A

Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Windows user called the help desk to request that their local user account password be reset on their computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.

What is the most likely reason for the lost data files?

A

The user had previously encrypted their data files and folders using EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Becky has been assigned to help with a major change to her company’s accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor caused the change to fail.

What is Becky’s mistake called?

A

Out of scope modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.

What step can be taken to limit access to the computer?

A

Configure logon time restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security policy can be implemented to prevent removable media from automatically launching potentially harmful applications?

A

Disable AutoRun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of your clients at work calls and is irate because they had to change their password and now, they can’t seem to find one that will match the strength needed for the company server. After they finish venting, you tell them you will send them the document that explains why they need to have a strong password.

What document will you send the client?

A

Password Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a folder in the Documents library on her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied.

Which option can Allison employ to resolve the security issue?

A

Run a Windows Defender Offline scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Roger’s company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex.

Which option can Roger change in Windows to require more complex passwords?

A

Password Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.

What is the first step in implementing the data share?

A

Share the folder or volume on the file server that will store the shared data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file’s permissions but cannot locate where to make the change.

What step would the technician take to make the change?

A

Click the Advanced button to open Advanced Security Settings for the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.

What term best describes this method of printer connectivity?

A

Network printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS.

Which option would James recommend as an upgrade to RADUIS?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As we configure the device and work with various settings to ensure the best quality environment possible, it is important to track and monitor various events so that if they need to be responded to, it can be done so in a timely manner.

Which of the following components of policies will allow for event-based monitoring?

A

Audit login failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.

Where can Zach go to check the security logs?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network.

Which service is Jennifer’s company making use of?

A

RADIUS

16
Q

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user’s computer was recently passed to them from another user in the company, and according to company policy, the user should have access only to the accounting share.

What option best describes the situation above?

A

The principle of least privilege was not followed.

17
Q

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.

How can the settings be configured with the least effort by the admin?

A

Configure Group Policy to run a logon script.

18
Q

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.

What happens to the permissions of the file on the D:\ drive when copied?

A

The file will lose all permissions.

19
Q

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.

What is the most likely reason for the difficulties that the technician is experiencing?

A

The technician should be setting NTFS permissions instead of using Group Policy